Tune into here for latest happening!! and all the Tips and DIY about the IT world..

Main menu

Category LINUX

Post navigation

Consider the following situation. You are at your friend’s place with your laptop and you want to access your home computer to do something. May be you want to start a download or you want to run a program right away. What would you do in this situation? Will you go all the way to your house just to start a download? You already have a laptop at your disposal, so you should be able to use it somehow. You can just connect to your home computer through internet. But what if someone else hacks you while you do that? This is where SSH comes in.

What exactly is SSH?

SSH stands for Secure Shell and it is basically a program to log into another computer over a network. Now why would we want to do that? May be you want to transfer data, run a program, execute some other commands etc. There are plenty of reasons why one would want to access another machine remotely. The good thing about SSH is that it connects you through a secure channel over an insecure network. If you are using a public wifi network, you might be open to attacks. You need to send your credentials to your computer so that the computer knows that it is in fact you who is requesting access. But the problem with insecure networks is that these credentials can be hacked. Hence SSH uses a secure channel over these insecure networks to ensure the safety. If insecure networks are like battle fields, then secure channels are like bullet proof jackets.

We generally mostly use it to control our remote Servers that sits on different location and we avail our services and complete our job.

How does it work?

SSH provides strong authentication and secure communication between two computers. It uses Public Key Cryptography to authenticate the remote computer and allow the remote computer to authenticate the user as well. I have discussed more about Public Key Cryptography here. SSH uses a client-server model. The server is a big machine which provides a common platform for various people. Clients are people who connect to this big machine and use it for various purposes. The server is like a big house and clients are people who have keys to this house. A server offers various services like storage, computing, routing etc. Depending on the situation, you can use it in different ways.

Tunneling

SSH also supports tunneling. Now what exactly is tunneling? Whenever you want to transfer data over a network, you encrypt it and then send it. Even if somebody sees it, he will not be able to understand the data. But what would you do when you cannot encrypt the data? Or if you just want to send unencrypted data over a network? This is where tunneling comes in handy. Tunneling is used to transfer unencrypted data through an encrypted channel. In order to set up an SSH tunnel, you have to configure an SSH client to forward a specified local port to a port on the remote machine. Have you heard of this software called PuTTY? It’s an SSH client software. You can use it to access a remote machine. Once the SSH tunnel has been established, the user can connect to the specified local port to access the network service. Mac users can directly use ssh via Terminal.

To access a web server (this will open a terminal on the remote machine):

$ ssh username@server.address.com

To connect to X server (this will enable X11 forwarding):

$ ssh -X username@server.address.com

If you have a login:

$ ssh -l login_name user@hostname.com

Data Transfer

SSH uses sftp for file transfer. It is an interactive command that uses the same syntax as a standard command-line ftp client. It differs from a standard ftp client in that the authentication and the data transfer happens through the SSH protocol rather than the FTP protocol. The SSH protocol is encrypted whereas the FTP protocol is not. You can just use:

$ sftp username@hostname.com

There are various commands like put, get, ls etc. They are pretty basic and you can read up more about them if you want.
One of my favorite SSH client that I use in my day to day life is Putty. You can download it here it’s free.
It’s a very simple ssh client that can work on any internet connection, even it on a gprs from your mobile phone.

TriggerTrap, a remote DSLR trigger app that is must have for every photographers and geeks. It’s not the only remote DSLR app we have plenty remote DSLR apps flying on the android playstore, but this one has almost supported to all the popular camera makers and models. You can control almost anything and more than your camera osd gui. To know, if your camera is in the list check here. You can also issue a request to them if your one is not listed. They are offering this app with a nominal cost and also they are providing USB OTG cables in a very cheap price, which is very difficult to get on a local market.

It’s basically a tool through which you can issue shell commands via your computer to your phone. ADB stands for Android Debug Bridge. It comes as a part of the standard Android SDK, which you can grab here. Basically, it provides a terminal-based interface for interacting with your phone’s operating system. Since Android platform is based on Linux, command-line is the only way to obtain and manipulate root access often required to perform certain advanced operations on your device using root access.

You can also directly issue commands by installing a terminal applications like terminal emulator, but it’s not handy to execute complex commands on such a small screen.
So, want to get into the android era?

So, first step is to get the android SDK on your computer from here. Just download the installer and install it to any drive, in this guide I am installing to a folder called android in C drive i.e (C:\android).

This slideshow requires JavaScript.

after installation has completed just click finish and it will automatically launch the SDK Manager. Now select both the option i.e platform tools and SDK tools and accept it and click Install. Once the process is done, you will have a ‘platform-tools’ folder inside your (C:\android) folder. That folder will have your ADB and all its dependencies.

Now, set the path variable. So, that you can easily issue commands via any location in cmd.To make ADB along with other Android SDK tools and platform tools easily accessible from anywhere at the command line, we shall add their paths to the PATH environment variable.

Right-click on the ‘Computer’ icon and click ‘Properties’. Now click ‘Advanced System Settings’ from the options in the left pane to bring up the ‘System Properties’ window. In the ‘System Properties’ window, click the ‘Environment Variables’ button on the ‘Advanced’tab.

Go-to the ‘Path’ in the ‘System variables’ section and double-click it to edit it and click on the text box and bring the cursor to the last.

Just add the below lines at the end of it, including both the semi-colons:

;c:\android\tools;c:\android\platform-tools

Note:If you have installed the SDK’s contents to another directory, make sure to use that one for your PATH variable.
Notice that the semi-colons are necessary to separate each path variable entry from the next and previous ones.

Click ‘Install Selected’ and in the window that pops up, click the ‘Accept all’radio button followed by the ‘Install’ button. After the installations completed. The drivers for both 32 bit and 64 bit systems will now be present in the SDK(C:\android) folder under ‘usb_driver\x86′ and ‘usb_driver\x64′ sub-folders respectively.

Disclaimer: This is for educational and personal purposes only,You should not apply this to other people phones without permission.

So, today I am going to post a very detailed guide about how we can unlock android device pattern in-case you forgot, and can’t bypass it via official method i.e. via Google account login authentication because of you didn’t have DATA connection enabled or it was disabled before it got locked.

Actually this happened to me once, That day while going to sleep I just set a unlock pattern, but the next day when I woke and trying to wake my device, It was asking for the unlock pattern but my mind was completely back and I just forgot the pattern and it got locked.

But I tried going via Forgot pattern? option but no luck due to unable to sign in cause I have disabled the data connection last night before going to sleep. But, I somehow managed to unlock it via CWM and restored a nan-droid backup.(my device was already rooted & CWM recovery flashed, was running 2.3(Gingerbread))

There are many ways to do so, but what my personal choice is UNetbootin, it’s a very powerfull utility through which you can convert any ISO files or image files to make it boot or start from the USB drive instantly without burning to a physical media(saving time and cost).The best part is it support almost all the latest Linux Ditribution as well as rescue CD’s…